Skip to main content
info
This documentation is for version v2.6 of the product.
For the latest version(v2.7) documentation click here
Version: v2.6 print this page

Windows AD FS SSO

Amazon Cognito integrates with Windows Active Directory Federation Service to enable existing AD users to sign-on to Amorphic Data Cloud. This section explains how to register and set up your application with Windows AD FS as an identity provider.

What is Single Sign-On?

Single sign-on (SSO) is an authentication method that enables users to securely authenticate with multiple applications and websites by using just one set of credentials. SSO works based upon a trust relationship set up between an application, known as the service provider, like Amorphic Data Cloud and an identity provider, like Windows ADFS. This trust relationship is often based upon a certificate that is exchanged between the identity provider and the service provider. This certificate can be used to sign identity information that is being sent from the identity provider to the service provider so that the service provider knows it is coming from a trusted source.

Amorphic username convention

Due to the variety of systems Amorphic integrates with, Amorphic requires strict rules to be enforced for its usernames. Failure to follow the required rules may lead to Amorphic users not being able to login as intended. These rules required for Amorphic are conventional rules required for AD integration from other systems, and follow best practices.

The requirement for the usernames are as follows:

  • The usernames must be unique for different users
  • Usernames are integrated with access to datasets and resources, and as such cannot change
  • Should only start with a letter in lowercase, cannot be started with a number
  • Should be only alphanumeric, no special characters are permitted
  • Should use only lowercase alphabets
  • Should have a minimum of 3 characters and should not exceed 20 characters
info

It should be noted that any and all transformations used to convert the username in the SSO provider to the Amorphic username should produce a username compliant with the Amorphic username convention specified above. For eg; if you have John_Doe@email.com and the transformation gives it as John or John_Doe, it is not compliant as it violates the first and last rules, and it would be best to be something like johndoe. If you have such IDs, it is recommended to create new field with an Amorphic compliant username format, and to use that as an Amoprhic username.

Pre-requisites for Windows ADFS Identity Provider

Before we proceed with the Windows AD FS IDP setup, we need the following pre-requisites:

  1. Active Directory Federation Service configured, available under a given domain to public and a valid SSL certificate.
  2. Amorphic application deployed with Identity Provider option enabled

Steps to register Amorphic app with AD FS

Connect to the Windows instance using a Windows RDP client.

Add a claims-aware relying party trust in AD FS

  1. Open ADFS Management Application and click on Relying Party Trust and click on Add Relying Party Trust option in the Actions pane Relying Party Trust

  2. Select Claims Aware and click start

  3. On the next page, select Enter data about the relying party manually option and click Next and specify a Display name on the next page.

  4. On Configure URL page, select Enable support for the SAML 2.0 WebSSO protocol option and for Relying party SAML 2.0 SO service URL enter, formatted as follows: https://congnitodomain.auth.region.amazoncognito.com/saml2/idpresponse. Replace congnitodomain with your Amazon Cognito user pool's domain prefix and replace region with the user pool's AWS region

Relying Configure URL

  1. For Relying party trust identifier, enter this URN: urn:amazon:cognito:sp:your_user_pool_id. Cloudwick support team can provide the cognito domain and userpoolid. Click on Add button and then Next button.

  2. Choose Permit everyone policy and click Next and keep the rest default.

  3. Now you can see that a Relying Party trust has been created.

Edit application's claims issuance policy in AD FS

  1. Add a rule to the trust created above, to send LDAP attributes as claims. Amorphic requires 3 claims in the SAML response - name, username and email. Select the newly created trust and click on Edit Claim Issuance Policy� option.

Relying Configure URL

  1. Click on Add New Rule, then for Claim rule template select Send LDAP Attributes as Claims and click Next For Claim rule name, enter Name ID. For Attribute store, choose Active Directory. For LDAP Attribute, choose SAM-Account-Name For Outgoing Claim Type, choose Name ID

  2. Repeat the same for Email. For Claim rule name, enter Email. For Attribute store, choose Active Directory. For LDAP Attribute, choose E-Mail-Address. For Outgoing Claim Type, type email in small cases. Do not select Email from the list instead.

  3. Repeat the same for Username. For Claim rule name, enter Username. For Attribute store, choose Active Directory. For LDAP Attribute, choose SAM-Account-Name. For Outgoing Claim Type, type username in small cases.

  4. To add Name in SAML claims, click on Add, then select Send Claims Using a Custom Rule for Claim rule template. For Claim rule name, enter name. For rule, enter the following.

c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname", Issuer == "AD AUTHORITY"]
=> issue(store = "Active Directory", types = ("name"), query = ";displayName;{0}", param = c.Value);
  1. Click on Apply button and then Ok button Relying Configure URL

Update Amorphic with credentials

  1. In Amorphic CMP (customer management portal), select IDP provider as SAML and update the values.
  • IDP Server URL in cmp corresponds to https://<domain_name>/adfs/ls
  • IDP Metadata URL in cmp corresponds to https://<domain_name>/federationmetadata/2007-06/federationmetadata.xml

Once the values are added, click on Update IDP Details. This will take around 45-60 mins to get reflected in the login page.

image

Frequently asked questions (FAQ)

1. What happens if any configuration changes at Identity Provider end?

a. When Identity Provider configuration like Certificate, etc changes, Cloudwick support team must re-import the saml metadata file in AWS Cognito Console.